2 Cousins from New Orleans, LA doing what we feel. We have been making music since we discovered our talents at around age 13. We grew up in hard times, no money, broken homes, and bad neighborhoods and all we ever wanted to do was make music. Fast forward to 2003 and I (Robert "4Shay" Foucha, 22) am in the US Coast Guard in Washington state, and Renae "Tipsy" Atkins, 22, is in New Orleans, LA and we talk everyday about the music, just keeping hope alive...
|stadler - intrusion|
stadler - intrusion
Keywords: stadler - intrusion
|Intrusion Detection using C4.5: Performance Enhancement by Classifier Combination|
Data Security has become a very critical part of any organizational information system. Intrusion Detection System (IDS) is used as a security measure to preserve data integrity and system availability from various attacks. This paper evaluates the performance of C4.5 classifier and its combination using bagging, boosting and stacking over NSL- KDD dataset for IDS. This dataset set consists of selected records of the complete KDD dataset.
Keywords: Intrusion Detection
|Context-Aware Intrusion Detection and Tolerance in MANETs|
Mobile ad-hoc network (MANET) is a decentralized network where each node will forward the data to other nodes. The major challenge in handling security in MANETs is that the network is not constant and thereby it is difficult to set a constant algorithm for detecting the intrusion. In this work, a context-aware intrusion detection and tolerance module for MANETs is proposed. A node in MANET can be a filtering node or a monitor node...
Keywords: Context-aware; MANET; Intrusion Detection; Intrusion Tolerance
|Detection of suspected nodes in MANET|
Mobile ad hoc network (MANETs) is an emergingarea with practical applications. One such field concernsmobile ad hoc networks (MANETs) in which mobile nodesorganize themselves in a network without the help of anypredefined infrastructure. Securing MANETs is an importantpart of deploying and utilizing them, since them are oftenused in critical applications where data and communicationsintegrity in important...
Keywords: MANET; Intrusion detection; AODV
|Intrusion Detection Systems|
To be viewed in conjunction with the slides on slideshare
Keywords: Intrusion Detection Systems
|stadler - intrusion 3 - stadler|
stadler - intrusion 3
Keywords: stadler - intrusion 3
|Intrusion Prevention & Detection System Market (IDS/IPS) to reach $5.042 Billion by 2019|
The report “Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Market (Host Based IDS/IPS, Network Based IDS/IPS, Wireless IDS/IPS, On-premise & Cloud Deployment, Appliances, Software, Professional Services) – Global Advancements Forecasts & Analysis (2014-2019)″ by MarketsandMarkets is now available at RnRMarketResearch.com.The global IDS/IPS Security market is estimated to be $2.716 billion in 2014 and is expected to grow to $5.042 billion in 2019...
Keywords: Intrusion Prevention system; Intrusion Detection System; Intrusion Prevention system market; Intrusion Detection System market forecast
|Anomaly Based Intrusion Detection using Feature Relevance and Negative Selection Algorithm - Jothi Lakshmi U|
With the increase in the use of internet, the job of malicious people has been made easy to exploit vulnerabilities in existing system. Intrusion Detection System (IDS) plays a major role in computer/network security in recognizing such malicious activity called intrusion. IDSs’ quick and correct detection of unknown intrusions help in reducing damage/loss to the sensitive information. IDS with such quality need to be encouraged...
Keywords: Intrusion Detection; Feature Relevance; Negative Selection; Anomaly Based Intrusion Detection
|Stadler - Intrusion v5. New Era. - Stadler|
Stadler - Intrusion v5. New Era.
Keywords: Stadler - Intrusion v5. New Era
|Intrusion Detection System - False Positive Alert Reduction Technique|
Intrusion Detection System (IDS) is the mostpowerful system that can handle the intrusions of the computerenvironments by triggering alerts to make the analysts takeactions to stop this intrusion, but the IDS is triggering alertsfor any suspicious activity which means thousand alerts thatthe analysts should take care of it. IDS generate a largenumber of alerts and most of them are false positive as thebehavior construe for partial attack pattern or lack ofenvironment knowledge...
Keywords: Intrusion Detection; False Positives; Alert Reduction
|Intrusion Detection Using Conditional Random Fields|
Intrusion detection systems have become a keycomponent in ensuring the safety of systems and networks.This paper introduces the probabilistic approach calledConditional Random Fields (CRF) for detecting network basedintrusions. In this paper, we have shown results for the issueof accuracy using CRFs. It is demonstrated that high attackdetection accuracy can be achieved by using ConditionalRandom Fields...
Keywords: Intrusion Detection; Conditional Random Fields; Network Security
|A Network Attack Classification for Multi Agent System Using Flow Based Intusion Detection System - K.A.VarunKumar, S.Sibi Chakkaravarthy ,G.Saravanan, V.Vetriselvan, P.Dharani, C.Aravind|
Intrusion detection system is precious for protecting the entire network from a large range of threats, modern intrusion detection techniques must cope with not only increase the detection rate but also increase the speed of the network line, signature based ids forced to sample meagerly, increasing the probability of harmful traffic flowing towards the network without inspection subsequently, flow based id is attaining awareness as an effective complement...
Keywords: Network Attack; Multi Agent; Intrusion Detection; Classification
|NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM (Volume 2) - Arul Anitha|
Attacks on the nationâs computer infrastructures are becoming an increasingly serious problem. Firewalls provide a certain amount of security, but can be fooled at times by attacks like IP spoofing and the so called authorized users. So an intelligent system that can detect attacks and intrusions is required. The tool GRANT (Global Real-time Analysis of Network Traffic) being a Linux based Intrusion Detection System(LIDs), takes the advantage of the security of a Linux box and secures the other...
Keywords: Intrusion; attack; security; GRANT; LIDS; ijorcs
|Noosphere Intrusion 005 with mParadis - mParadis|
Noosphere Intrusion 005 with mParadis Promo dj set (progressive techno & house music) Please, buy all the tracks you like. Tracklist : 1- Couldn't love you more (Shlomi Aber remix) by The Factory [Toolroom] 2- Choke (dub mix) by Gun & Napalm [Elektro-Lyte] 3- My Affliction by Brandon Invergo [Zuvuya] 4- U are the reason beats by Marko Nastic [Tronic] 5- Love (the Splash dub mix) by Splashfunk & Funky Junction [Sheeva] 6- Ghostrack (radio slave mix) by Tiefschwarz [Souvenir Music] 7- Escape (vers...
Keywords: Noosphere; Intrusion; Progressive house; techno; dj set; mParadis
|A Novel Classification via Clustering Method for Anomaly Based Network Intrusion Detection System|
Intrusion detection in the internet is an active area of research. Intruders can be classified into two types, namely; external intruders who are unauthorized users of the computers they attack, and internal intruders, who have permission to access the system but with some restrictions. The aim of this paper is to present a methodology to recognize attacks during the normal activities in a system. A novel classification via sequential information bottleneck (sIB) clustering algorithm has been pr...
Keywords: Intrusion Detection; Meta Classifier; Unsupervised clustering; Sequential Information bottleneck clustering
|HITB 2003 Security Conference - Meling Mudin - Putting the Eye on IDS|
Meling Mudin - Putting the Eye on IDS Nowadays, a lot of organizations are deploying Intrusion Detection Systems (IDSes) as part of their security infrastructure. In Malaysia, we have seen IDS deployments in the public sector, and also private sector. However, there are a few questions that are always asked by these organizations when deploying IDSes: What is in it for my organization? Unlike other security devices such as firewalls and VPNs, organizations do not see the immediate value of .avi....
Keywords: IDS; intrusion; vulnerabilities; security; hack; security conference; security professional
|BILLIAN - INTRUSION - BILLIAN|
Keywords: BILLIAN; INTRUSION; NEUROFUNK; BREED 12 INCHES; CKY12QXZ
|Thracians and Mycenaeans ~ Proceedings of Fourth International Congress of Thracology|
Authors: Alexander Fol (1), Jan Best and Nanny de Vries (2) (1) Institute of Thracology, Bulgaria (2) Henry Frankfort Foundation, Netherlands Terra Antiqua Balcanica - E. J. Brill, Sofia - Leiden, 1989, 306 pp.
Keywords: Trojan War; Mycenaean Intrusion into Thrace; Bronze Age Europe
|The Intrusion of Jimmy - P.G. Wodehouse|
LibriVox recording of THE INTRUSION OF JIMMY, by P.G. WODEHOUSE. Read by Mark Nelson. The action begins with playboy bachelor Jimmy Pitt in New York; having fallen in love on a transatlantic liner, he befriends a small-time burglar and breaks into a police captain's house as a result of a bet. The cast of characters head to England, and from there on it is a typically Wodehousian romantic farce, set at the stately Dreever Castle, overflowing with imposters, detectives, crooks, scheming lovers an...
Keywords: librivox; literature; audiobook; The Intrusion of Jimmy; Wodehouse; humor; fiction
Downloads: 15,657 (5 reviews)
|Evaluation of intrusion detection systems (Volume 108) - Ulvila, J.W.|
Journal of Research of the National Institute of Standards and Technology
Keywords: intrusion detection; Bayesian statistics; computer security; decision analysis
|Network Security Using Linux/Unix Firewall|
Network Security concerns with concept of designing a secured network is the most important task in any enterprise or organization development. Securing a network mainly involves web filtering, application control, applying policies and rules in your network to protect from unauthorized access. Servers such as application server, web server, Database server are critical devices in your network which require complete Network security for proper working in any organization...
Keywords: untangle firewall; IDS (Intrusion detection system); WIPS (Wireless intrusion protection system); RDP(Remote desktop protocol); DDOS(Distributed denial of service attack )
|A Two-Level Autonomous Intrusion Detection Model Inspired by the Immune System - Elnaz B. Noeparast|
There are several methods applied to distributed system security, which have the same absolute view of the intrusion. In their view, an operation could be legitimate or intrusive, which does not have any consistency with the complicated and heterogeneous nature of distributed systems. In this paper, a two level multi-agent model is proposed whose first level determines system’s unsafe behaviors based on anomaly occurrence...
Keywords: Distributed Systems; Intrusion Detection; Multi-Agent Systems; Immune System; ijorcs; ijorcs.org
|Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network: Review & Analysis|
The development of Internet protocols are greatlyneeded as the network security becomes one of the mostimportant issues. This brings the need to develop IPv4 intoIPv6 in order to proceed towards increasing the networkcapacity.Now Intruders are considered as one of the most seriousthreats to the internet security. Data mining techniques havebeen successfully utilized in many applications. Manyresearch projects have applied data mining techniques tointrusion detection...
Keywords: Network Security; IPv6 Security; Intrusion Detection; Denial of Service; Data mining
|FFWC 252 Intrusion On The Battle - Faith Family Worship Center|
Pastor Romeo DelMonte visits us and shares his thoughts on how to be prepared in the spiritual battlefield.
Keywords: Intrusion On The Battle; Romeo; DelMonte; faith; family; ffwc; worship; christianity; faith family worship center
|T2TN081010MC - dw|
Constitutionalist Nazarene Israelite Mark Call, host of the Mark Call Daily News and "Come Out of Her My People" leads the discussion about government usurpation of rights, our willingness to become slaves,our proper role and responsibility according to Torah and much more as we find out what it means to be "in the world but not of the world" according to Torah - the Bible. Intrusion in private life, confiscation of rights and property, government obstruction and enslavement of it's people are o...
Keywords: Mark Call; Constitution; Thugs; Slavery; intrusion in private life; confiscation of rights; government obstructionn
|t2tn032610RMa - dw|
End-times, government intrusion, health plans and getting ready to go as the nation of Israel were discussion topics followed by a report from Jamacia by Rav. Ralph Messer
Keywords: End-times; government intrusion; health plans; Israel; Jamacia; Rav. Ralph Messer
|T2TN050310KLa - dw|
Keywords: End-times; government intrusion; health plans; Israel; Jamacia; Rav. Ralph Messer
|Quasi-One-Dimensional Modeling of Pulse Detonation Rocket Engines - Morris, Christopher I|
Pulse detonation rocket engines (PDREs) offer potential performance improvements over conventional designs, but represent a challenging modeling task. A quasi 1-D, finite-rate chemistry CFD model for a PDRE & described and implemented. A parametric study of the effect of blowdown pressure ratio on the performance of an optimized, fixed PDRE nozzle configuration is reported. The results are compared to a steady-state rocket system using similar modeling assumptions.
Keywords: AIR TRAFFIC; FAULT TOLERANCE; SECURITY; COMPUTER SECURITY; INTRUSION DETECTION (COMPUTERS); PROTOCOL (COMPUTERS); COMPUTER PROGRAM INTEGRITY
|A Study and Comparative Analysis of Conditional Random Fields for Intrusion Detection - Deepa Guleria, M.K.Chavan|
Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Due to complex and dynamic nature of computer networks and hacking techniques, detecting malicious activities remains a challenging task for security experts, that is, currently available defense systems suffer from low detection capability and hig...
Keywords: Intrusion Detection System; Conditional Random Fields; Network Security; Decision tree; ijorcs; ijorcs.org
|MassDEP BWSCAC - September 25 2008 - Indoor Air - Elizabeth Callahan|
Presentation on Indoor Air by Elizabeth Callahan to the Massachusetts Department of Environmental Protection's Waste Site Cleanup Advisory Committee. September 25, 2008.
Keywords: MassDEP; Indoor Air; Waste Site Cleanup; Vapor Intrusion; VI; Elizabeth Callahan; tetrachloroethylene; PCE; Perc; background
|MassDEP BWSCAC January 24 2008 - Indoor Air - Paul W. Locke|
Indoor Air Workgroup â Paul Locke discussed the draft Technical Update, "Using Upper Percentile Values Within The Range Of Typical Indoor Air Concentrations At Residences and Schools" Presented at the January 24, 2008 meeting of the MassDEP Waste Site Cleanup Advisory Committee.
Keywords: MassDEP; BWSC; Advisory Committee; Indoor Air; background; vapor intrusion; typical indoor air levels; UPV; Massachusetts; environment
|Elitism Enhancements for Genetic Algorithm based Network Intrusion Detection System - Tanapuch Wanwarang, Machigar Ongtang|
Traditional signature-based Network Intrusion Detection Systems (NIDS) suffer from high false negative rate because it can detect an intrusion only if there is an existing rule matching the particular real-time attack. The combination of Genetic Algorithms, network security schemes, and IDS practices has created a model of intelligence system that has the ability to derive new best-fit classification rules from already known attack patterns...
Keywords: Genetic Algorithms; Intrusion Detection System; Network Security; Support-Confidence Framework; Evolutionary Process
|Structural Analysis and Testing of the Inflatable Re-entry Vehicle Experiment (IRVE) - Lindell, Michael C.|
The Inflatable Re-entry Vehicle Experiment (IRVE) is a 3.0 meter, 60 degree half-angle sphere cone, inflatable aeroshell experiment designed to demonstrate various aspects of inflatable technology during Earth re-entry. IRVE will be launched on a Terrier-Improved Orion sounding rocket from NASA s Wallops Flight Facility in the fall of 2006 to an altitude of approximately 164 kilometers and re-enter the Earth s atmosphere...
Keywords: TOTAL OZONE MAPPING SPECTROMETER; STRATOSPHERE; SPECTRAL RESOLUTION; HURRICANES; TROPICAL STORMS; CLIMATOLOGY; CYCLONES; ESTIMATES; INTRUSION; OZONE; SAMPLING
|HITB 2003 Security Conference - Shaheezul (Pandir Harris) - IDS over IPV6|
Shaheezul (Pandir Harris) - IDS over IPV6 IDS - intrusion detetction system IPV6 - newer IP protocol (versus IPV4) part of research with a local university (presentation material in zip)
Keywords: IDS; intrusion; IPV6; security; hack; vulnerabilities; security conference; security professional
|Research on the Application of Internet of Things in Airport Enclosure Intrusion Detection and Alarm System|
An airport enclosure intrusion detection and alarm System based on internet of things was presented in this paper, the paper focus on ZigBee wireless communication protocol network, gave out the hardware and software design method of intelligent wireless sensor node through applying CEL ZigBee development kit. Obliquity, tension, video and other data acquisition was completed to provide data basis for the invasion judge and the final decision-making...
Keywords: Internet of Things; Airport enclosure; Intrusion detection and alarm system; ZigBee network
|ThreatSentry - http://www.privacyware.com/index_TS.html|
This program protects servers running Microsoft Internet Information Services. ThreatSentry continuously collects, analyzes and organizes server events into an evolving baseline of acceptable activity. Each server connection is compared against this baseline to identify and take action against any activity falling outside of acceptable parameters. ThreatSentry protects network weak points created by lapses in patch management, configuration errors, and the use of new and progressive attack techn...
Keywords: ThreatSentry; Internet; Monitoring; Server; HOST INTRUSION PREVENTION; IPS; IIS SECURITY; IIS FIREWALL; INTRUSION PREVENTION; WEB SERVER SECURITY; WINDOWS WEB SERVER; SERVER SECURITY; SERVER SECURITY SOFTWARE; IIS; MICROSOFT IIS; ThreatSentry
|MassDEP Waste Site Cleanup Advisory Committee Meeting - Oct 27 2011 - MassDEP Bureau of Waste Site Cleanup|
Audio from the October 27, 2011 meeting of the Massachusetts Department of Environmental Protection (MassDEP), Bureau of Waste Site Cleanup (BWSC) Advisory Committee. Location: One Winter Street, Boston, Massachusetts Time: 9:30 AM Topics include Regulatory Reform items, Natural Resource Damage (NRD), Vapor Intrusion and Brownfields.
Keywords: MassDEP; BWSC; Waste Site Cleanup; hazardous waste; contamination; cleanup; remediation; site assessment; advisory committee; NRD; brownfields; vapor intrusion; Bouchard; 2011
|MassDEP-AdvisoryCommittee-BWSC-June262008-Indoor-Air - Elizabeth Callahan|
Presentation at the June 26, 2008 MassDEP Waste Site Cleanup Advisory Committee meeting. Elizabeth Callahan described two review drafts: âIndoor Air Threshold Values for the Evaluation of a Vapor Intrusion Pathwayâ and âTypical Indoor Air Concentrationsâ, are availablefor comment on the BWSC website.
Keywords: Indoor Air; BWSC; Advisory Committee; Massachusetts; MassDEP; Waste Site Cleanup; Department of Environmental Protection; volatilization; background; vapor intrusion; vapor
|Buildings 933 and 937 Vapor Intrusion Assessment and Field Sampling Report Presidio of San Francisco, California - Erler & Kalinowski, Inc.|
This report presents the methods and results of a vapor intrusion assessment conducted at Building 937 and additional sampling for volatile organic compounds in the subsurface at Buildings 933 and 937. This work was conducted in response to an 8 August 2005 request by the Department of Toxic Substances Control (DTSC) to conduct a vapor intrusion analysis at Building 937.
Keywords: environmental remediation; Building 933; Building 937; Crissy Field; soil contamination; groundwater contamination; petroleum contamination; vapor intrusion assessment; field sampling
|MassDEP Waste Site Cleanup Advisory Committee Meeting - March 28 2013 - MassDEP Bureau of Waste Site Cleanup|
Audio from the March 28, 2013 meeting of the Massachusetts Department of Environmental Protection's Waste Site Cleanup Advisory Committee. AGENDA 9:30 Program Updates 10:00 Soil draft technical update 10:30 MCP Amendments Overview/Process/Outreach Specific Topics - NAPL/LNAPL - Source Control - Permits for Active Exposure Pathway Elimination Systems 12:00 Adjourn
Keywords: Massachusetts; Department of Environmental Protection; MassDEP; Waste Site Cleanup; BWSC; remediation; contaminated sites; contamination; remediation; 2013 Reg Reform; Regulatory Reform; LNAPL; soil; vapor intrusion; active systems; source control
|An Automated Method for Identifying Inconsistencies within Diagrammatic Software Requirements Specifications - Zhang, Zhon|
The development of large-scale, composite software in a geographically distributed environment is an evolutionary process. Often, in such evolving systems, striving for consistency is complicated by many factors, because development participants have various locations, skills, responsibilities, roles, opinions, languages, terminology and different degrees of abstraction they employ. This naturally leads to many partial specifications or viewpoints...
Keywords: LUNAR TOPOGRAPHY; PLANETARY MAPPING; VALLEYS; CALDERAS; STRESSES; MATHEMATICAL MODELS; CORONAS; NATURAL SATELLITES; PHOTOGEOLOGY; TECTONICS; STRATIGRAPHY; MARS SURFACE; VENUS SURFACE; MAGNETIC SIGNATURES; INTRUSION
|Request for Concurrence on Suitability for Lease Building 937, Presidio of San Francisco - Presidio Trust|
The formal request from the Presidio Trust to the Department of Toxic Substances Control to provide concurrence on suitability for lease of Building 937. This letter provides a background on the environmental conditions at Building 937 and the surrounding area; describes the proposed reuse and potential tenants for Building 937; proposes mitigation measures that the Trust will implement to facilitate tenant leasing, building construction/rehabilitation, and tenant move-in to Building 937; provid...
Keywords: environmental remediation; Building 937; Crissy Field; soil contamination; groundwater contamination; petroleum contamination; subslab vapor sampling; indoor air sampling; vapor intrusion assessment; mitigation measures
|MassDEP Waste Site Cleanup Advisory Committee Meeting - October 28, 2010 - MassDEP Bureau of Waste Site Cleanup|
Audio from the October 28, 2010 meeting of the Massachusetts Department of Environmental Protection's Waste Site Cleanup Advisory Committee meeting. Topics covered include: (1) Introduction & General Updates; (2)Brownfields Support Teams 2010 Projects; (3) Natural Resource Damage (NRD) Program comes to MassDEP; (4) Vapor Intrusion Workgroup/Guidance Update; (5) Update other policies. 1 Winter Street, Boston, Massachusetts 02108
Keywords: Massachusetts Department of Environmental Protection; MassDEP; Waste Site Cleanup; BWSC; Advisory Committee; SAC; October 28 2010 meeting; eDEP; Vapor Intrusion; Natural Resource Damage; brownfields; Brownfields Support Team; BST
|MassDEP Waste Site Cleanup Advisory Committee - January 26, 2011 - MassDEP Bureau of Waste Site Cleanup|
Audio from the January 26, 2011 meeting of the Massachusetts Department of Environmental Protection ("MassDEP") Waste Site Cleanup Advisory Committee. Meeting included a greeting from MassDEP's new Commissioner, Kenneth Kimmell and discussion of Vapor Intrusion, Activity & Use Limitations (AULs), the Underground Storage Tank program, and the vegetable gardening exposure pathway.
Keywords: MassDEP; Waste Site Cleanup; Massachusetts; Department of Environmental protection; AUL; VI gardening; exposure vapor intrusion; land use limitation; sites; contamination; contaminated sites; brownfields
|Safe Surfing: Narcissist Invades Your Computer - Sam Vaknin|
ANYTHING SUSPICIOUS? Stop everything you are doing, disconnect from the Internet, and scan the computer for malware. Examples of suspicious behavior: persistent pop-ups; the computer or connection slow down considerably; repeated re-boots; mouse or keyboard freeze; strange messages and alerts. (From the book "Malignant Self-love: Narcissism Revisited" by Sam Vaknin - Click on this link to purchase the print book, or 16 e-books, or 2 DVDs with 12 hours of video lectures on narcissists, psychopath...
Keywords: narcissist; psychopath; internet; surfing; browser; malware; trojans; virus; worm; spyware; keylogger; anti-virus; firewall; sandboxing; social engineering; intrusion; identity theft; password; user id
|EON8 - EON8|
Keywords: EON8; Internet; Web; Forum; ASCII; Apocalypse; BBS; Criminal; Cyber; Terrorist; Encrypt; Espionage; Government; Hacker; Hacking; Virus; Viruses; Intrusion; Phreaking; Spying; Threat; Trojan; Worm
|MassDEP Waste Site Cleanup Advisory Committee October 01 2009 - Massachusetts Department of Environmental Protection|
Audio from the October 1, 2009 meeting of the MassDEP Waste Site Cleanup Advisory Committee. Topics covered include: Introduction and budget issues, eDEP and other operational priorities, Policy priorities, AUL compliance letter, Vapor Intrusion, CAM, LNAPL, AUL Guidance, Historic Fill and ASBESTOS-IN-SOIL.
Keywords: MassDEP; environmental protection; massachusetts; government; waste site cleanup; hazardous waste sites; cleanup; LNAPL; eDEP; budget; AUL; CAM; analytical methods; asbestos; historic fill; soil; vapor intrusion; pce; dry cleaners
|MassDEP Waste Site Cleanup Advisory Committee - October 01, 2009 - MassDEP|
Audio from the October 1, 2009 meeting of the MassDEP Waste Site Cleanup Advisory Committee.
Keywords: eDEP; Massachusetts DEP; environmental protection; Locke; Commerford; Callahan; Marra; Muldoon; Martin; Shaw; vapor intrusion; AULs; CAM; analytical methods; policies; soil; asbestos; historic fill
|MassDEP Waste Site Cleanup Advisory Committee - March 26, 2009 - Massachusetts Department of Environmental Protection|
Proceedings of the March 26, 2009 meeting of the Massachusetts Department of Environmental Protection's Waste Site Cleanup Advisory Committee. Topics for this meeting include NAPL/LNAPL, Significant Figures, Indoor Air/Vapor Intrusion and Analytical Methods.
Keywords: MassDEP, Environmental Protection, BWSC, Waste Site Cleanup, Massachusetts, 21E, vapor intrusion, significant figures, site assessment, risk assessment, NAPL, LNAPL, indoor air